Peningo Systems, Inc.

Resume of Candidate: PEN162


Rate: email us at info@peningo.com for rate information or call 914-921-3102

Oracle Security  Consultant


Summary:

Information Technology and Security professional with over 10 years experience in architecting and
deploying Identity  Management, LDAP Directories, Single/Reduced Sign-On (SSO), Provisioning and Reconciliation/Identity Workflows, Access
Management, RBAC (Role-Based Access Control), Compliance  and Auditing Technologies, Federated Identity, Enterprise  System Architecture, Security
Infrastructure Design, Authentication and Authorization technologies,  as well as custom-built security and technology frameworks.

Proven technical leadership skills include the ability to manage teams, earn the respect of its members, lead by example, and thrive in an
entrepreneurial environment. Persuasive verbal and written communication  skills compliment  a proven ability to multi-task, maintain an organized
approach, and ensure success - even when faced with high-pressure or high-risk situations.  

Often placed in a position to liaison between the project owners and project staff to ensure that all milestones are met and that complete understanding
exists between tiers.This is all done while maintaining a hands-on engineering and architecture role.

Engagements within many large-scale environments, both public  and private, as a consultant including  GM, EDS, Subaru of America, ITT, Unitrin,
Guardian Life,Tyco Electronics, Gartner, Paychex, City University of New York (CUNY), West Virginia University, University of Massachusetts and Embry
Riddle Aeronautical  University. Experience in the Government, Education, Healthcare, Auto and Telecom Industries.  User populations have fluctuated
from a few hundred to an excess of 1.3 million identies.

Developed, and freely published online, the installation videos / tutorials on Oracle’s entire
Fusion Middleware 11g software stack.

Skills
IDENTITY MANAGEMENT & SECURITY: Oblix COREid/Oracle Access Manager (OAM) 10g and
11g, Oracle Identity Manager (OIM / Xellerate)  10g / 11g (R2, R2), Oracle  Identity  Federation (OIF), IBM Tivoli Suite (ITIM/TIM,TAM),Webseal, RSA
Cleartrust, PKI, Kerberos, CA/Netegrity SiteMinder, CA/Netegrity  IdentityMinder, Sun Identity  Manager, Oracle  Enterprise  Single Sign-on (Passlogix),
Novell Identity  Manager, Novell Access Manager, SUN/IBM/Oracle  Federation Manager, Oracle  Role Manager (ORM), Oracle  Business Intelligence
Enterprise Edition (OBIEE), Oracle Entitlements Server (OES).

LDAP DIRECTORIES: Microsoft Active Directory, ADAM, IBM Secureway,Tivoli Directory Server, NDS/Novell eDirectory, and Sun One Directory Server,
Oracle Internet  Directory (OID) 10g and
11g, and Oracle Virtual Directory (OVD) 10g and 11g.

BACKOFFICE SOFTWARE: Database (SQL/Oracle/DB2),Webserver (IIS, Apache,OHS,IHS), Reverse Proxy, Citrix,Terminal services, Portal (Plumtree,
Websphere Portal) Application Server (Weblogic, IBM Websphere, JBoss,Tomcat, Oracle Application Server (OAS / OC4J)), Integration (DirXML, IBM TDI,
SPML), RACF, SAML, Liberty Alliance.

OPERATING SYSTEMS: Microsoft Windows up to Windows 2008 Enterprise Edition, UNIX (SOLARIS, AIX, IRIX, HP/UX, LINUX, OSX), MS-DOS.

NETWORKING:TCP/IP, DNS,WINS, NFS, Samba, NIS, NIS+, Cisco NAC, and NetBIOS.

APRIL  2013 - present
Identity  Management Assessment Engineer

•  Architected  and deployed a multi-environment 11gR2 roll-out

•  Installed and configured OAM, OIM, OID, OVD, OIF (all 11gR2) on WebLogic

•  Integrated OAM and OIM for self-service

•  Connected OAM to Webcenter Portal, OBIEE, and third-party web-apps

Connected OAM to multi-tiered  OIF federations across LEA’s


Identity  Management Assessment Engineer

•  Brought in to stabilize, a legacy OAM 10g environment.

•  Developed all documentation  around their current infrastructure

Helped plan out their next steps in migrating to a newer  / supported software stack


Security and Identity  Management Architect / Engineer

•  Engineered Identity  and Access Management infrastructure for Oracle  11g Access suite

•  Built out highly available clustered tiers in multiple environments

•  Built out OAM 11g, OIF 11g, OVD 11g, and OID 11g

Upgrade 11gR1 to 11gR2 for 4 environments



Security and Identity  Management Architect

•  Architected Identity and Access Management infrastructure for Oracle 11g suite

•  Refined client requirements to fit product capabilities and more efficient timeline
•  Assisted hands-on in entire Oracle 11g Suite Install (OIM, OAM, OID, OVD, OED, eSSO) Liaison between technical team and client to maintain project
expectations and deliverables


Identity  Management Architect

•  Developed  a working  architecture for the Oracle Access Manager 10g and 11g

•  Covered all options with high availability, virtualization, and vendors

•  Delivered documentation on the strengths and weaknesses for each model

•  Worked directly with Oracle on integration of architecture with ODS

Identity  Management Architect

•  Brought in to assess, re-architect, and help engineer an Oracle Identity Manager solution

•  Produced staffing plans for IdM employment

Produced 3 environments under tight deadlines for semester enrollments

Identity  Management Engineer and Systems Support

•  Ongoing development of their identity management infrastructure

•  Oversight of OIM, OAM, OVD, OID, AD, and some PeopleSoft pillars

•  Systems included Redhat, Solaris, and Windows 2003

•  Support for 22 campuses and over 250,000 identities

Systems support for five different environments (iron and virtual)

Identity Management Engineer
•  Brought on for quick custom development of adapters for OIM Worked in sensitive government networks with layers of clearance

Identity  Management Architect

•  Assessment and redesign of their existing IDM infrastructure

•  Developed new project plan to transition entire corporation into a more efficient model

•  Help plan staffing for long-term internal support

Main stack in use was Oracle  Suite

Identity Management Pre-Sales

•  Brought in for technical experience in architecture for large Oracle IDM implementations

Closed deal and landed company an extensive contract.
!
Identity  Management Architect and Project Manager

•  Architect for the implementation of Oracle Identity Manager and Oracle Access Manager.

•  Lead a team of engineers through a multi-phase implementation

Saved UofL  66% on hardware costs within 3 days of being onsite
!
WASHINGTON METRO AREA TRANSIT AUTHORITY (WASHINGTON DC) | SPRING  2009
Identity  Management Architect

•  Brought in for initial assessment and IdM Planning coordination

•  Helped develop statement of work for hiring out contractors

•  Designed rough architecture based on high level requirements

•  Ensured that their project would be staffed correctly and set corporate  expectations for a successful IdM implementation



PRIORITY HEALTH (GRAND RAPIDS,  MI)  | MARCH 2009 - AUGUST 2009
Identity  Management Architect and Implementation  Engineer

•  Architect for and the implementation of Oracle Identity Manager and Oracle Role Manager.

•  Integrated all systems with multiple back-end database systems.

Cut project scope and duration down by over 30% with discovery and project analysis

MARCH 2009
Identity  Management Architect and Implementation  Engineer

•  Architect for and the implementation of Oracle  Identity  Manager, Oracle Access Manager, Oracle  Role Manager, Novell Identity  Manager, and Novell
Access manager for POC evaluation.

•  Integrated all systems with Active Directory, SunONE LDAP, IIS and Apache web servers

•  Implementation  was done on multiple virtual servers through VMWare running Oracle
Enterprise Linux,Windows 2003, and SUSE Linux.

SUBARU OF AMERICA (CHERRY  HILL,  NJ) | NOVEMBER 2008 - FEBRUARY 2009
Identity  Management Architect

•  Architect for the implementation of Oracle  Identity  Manager, Oracle Access Manager, Oracle
Internet Directory, and Oracle Virtual Directory

•  Implemented OIM and OAM through Development, Staging, and Production

Developing custom workflows and Generic Technology Connectors for manual user dumps.

NOVEMBER 2008 - JANUARY 2009
IDM Consultant/Strategist

•  Interview key subject matter experts to determine current IDM/security hardware and software profile.

•  Analyze current network layout, services and resources to determine required access.

•  Determine user roles and responsibilities, classifying like users into groups to ease maintenance and rule implementations controlling access to
resources appropriate to user and group classifications.

•  Analyze and document (both existing and potential) solutions for the following: User account provisioning/de-provisioning, Enterprise Directory
Services, Single Sign-On (web and desktop), Password Management, Role-Based access control, Strong Authentication

•  Provide documentation  and recommendations detailing best practices for user and access control as determined by independent research and
current like institution implementations.



JULY 2008 - OCTOBER  2008
Senior Oracle IDM Architect and Engineer




•  Worked along side with Oracle on architecting and implementing  the Oracle Identity Management Suite into a 22-campus  environment with capabilities
of managing up to 1.3 million end-users.

•  Design was built around managing Students, Faculty, and Staff with multiple roles.

•  OIM was configured to talk to three separate Authoritative PeopleSoft sources for all identities.

•  Provisioning from OIM was configured for Oracle Internet Directory (OID), Oracle Virtual Directory (OVD), PeopleSoft using Apache reverse proxies and
PeopleSoft’s Pure Internet Architecture, and Active  Directory.

•  Managed a small team of 5 IdM engineers and worked directly with Oracle’s consultants to meet all deadlines.





UNIVERSITY OF MASSACHUSETTS (WORSTER, MA)  | OCTOBER  2007 - MAY  2008
Senior Oracle IDM Architect and Engineer

•  Architected and designed a six campus Identity  Management solution that encompasses the Oracle Fusion Middleware Stack (Oracle  Identity  
Manager, Oracle Access Manager, Oracle Internet Directory, Oracle Virtual Directory, Oracle Identity Federation, Oracle Access Server, and Oracle
Enterprise Linux).

•  Design was built around managing all 150,000+ Students, Faculty, and Staff.

•  Managed a team of integration  specialists to implement and promote through three environments and on a separate Disaster Recovery (DR) data
center.

•  Wrote all documentation  on use cases, implementation design, and promotion strategies.
•  Managed a separate  project with UMass and an external application service provider  to setup federation between the two entities. First successful
OIF SAMLv2 to Shibboleth federation to reach production.


GARTNER  (STAMFORD, CT) | SEPTEMBER 2007 - OCTOBER  2007
IDM Consultant/Strategist

•  Was brought in to finish out an Oracle Identity Manager implementation  what was falling behind a tight deadline.

•  In additional to being proficient  with the development technologies I have expert knowledge in all of the target systems and their components that the
product manages, including  LDAP directories, security  and databases.This helped bring the project to completing within deadline.

•  Modified out of the box Oracle Database Connectors  to fit Gartner’s given needs.

•  Responsible for reviewing and recommending enterprise identity management solutions and deployment alternatives to external customers and
internal end-users.

FOODBUY (CHARLOTTE, NC) | SEPTEMBER 2007
IDM Solution Architect

•  Brought on to assess current infrastructure and recommend best product fit - 2 week engagement

•  Reviewed current architecture and business requirements for an Identity  Management Solution

•  Provided a detailed  solution document with multiple vendors listing the benefits and disadvantages between  each of the suggested product  suites
and combinations.

•  Product Suite vendors reviewed: Oracle, IBM, CA, and Curion




PAYCHEX  (ROCHESTER, NY)  | JUNE 2007
IDM Architect and Implementation  Specialist

•  Performed Requirements Gathering for a Proof of Concept to be implemented into their environment in development.

•  Architected  and implemented Oracle Identity Manager into development with basic out of the box functionality in under 2 weeks with a single LDAP  as
their authoritative source, and provisioning users into Active Directory, Microsoft Exchange, and Oracle Internet Directory.

Wrote all documentation  and completed entire project in less than three weeks.

TYCO  ELECTRONICS (HARRISBURG, PA) | AUGUST 2006 - FEBRUARY 2007
Access Management Solution Specialist

•  Reviewed current architecture and business requirements for an Access Management  Solution

•  Architected  and implanted Oracle Access Manager (Oblix COREid) into three environments.
•  Developed a custom new user registration process using hooking into IDXML through COREid. Performed all project management and provided status
reports to managing director

TIME WARNER CABLE (RALEIGH, NC) | JULY 2006
Identity  and Access Management Solution  Specialist

•  Was brought in to get an existing Tivoli Identity  and Access Management (TIM / TAM) project back under deadline.

•  Wrote rules for Tivoli Data Integrator data marshaling

•  Worked as liaison between existing engineers and project directors on the Time Warner side

•  Redesigned project timeline, managed scope of initial deployment, and resolved issues between client and Time Warner.


GMAC  (DETROIT, MI)  | MAY  2005 - SEPTEMBER 2007
Access Management Specialist

•  Provided remote and on-site assistance to the deployment of Oblix COREid (now Oracle
Access Manager)

•  Built out, and promoted  solution through six environments and two off-site data centers.

•  Worked with off-shore staff, IBM consultants at their IBM campus in Raleigh NC, and with
GMAC staff in Detroit MI.

•  Wrote out and submitted step-by-step, run books for all implementation  details for Oblix.

•  Developed custom solutions to GMAC  business needs that Oblix was not able to accomplish.

•  Implemented multiple languages to both out of the box Oblix installation and custom Style sheets (XSL, XSLT, CSS, XML) for custom registration, login,
and forgotten  password forms.

EMBRY-RIDDLE AERONAUTICAL UNIVERSITY (DAYTONA, FL) | JANUARY 2007 - APRIL  2007
Identity  and Access Management Specialist

•  Initially was brought in to provide  a demo and Proof of Concept (POC) on Oracle’s Identity
Manager integrated into their environment.






•  Architected  and implemented Oracle Identity Manager as a migration from their current cross- custom identity management solution of M-tech IDM and
custom Perl scripts to a full production OIM solution.

•  Integrated OIM into Active Directory, Multiple Exchange servers, Oracle  Internet  Directory, and bulk loaded all users from a flat-file  dump from their
Authoritative Source.

Rewrote a couple  of Oracle’s out-of-the-box  connectors to fit their environment and needs.

UNITRIN (CHICAGO, IL) | NOVEMBER 2006 - FEBRUARY 2007
Identity  and Access Management Specialist

•  Designed and architected a multi-organization Identity  and Access management system using
CA’s Identity management suite (Identity Minder, Siteminder, eTrust Directory, and Admin).

•  Siteminder was setup to protect multiple web and application servers of different flavors

•  Identity Minder was configured to work with multiple authoritative sources and provision users to various end-systems across six different  sub-
organizations.This included a multi-domain Active Directory infrastructure.

•  Worked with CA to evaluate and fine-tune  their product,  as this was their first release of the suite is a package form. Had to constantly rewrite a lot of
their code and refine their documentation to successfully implement.

•  Wrote custom BLTH modules for bulk importing and custom application provisioning.

•  Worked with TEWS (CA’s web services core) for implementing a custom web interface for new user registration and self-maintenance packages.


EDS  (DUBLIN, OH)  | MAY  2005 - SEPTEMBER 2007
Identity  and Access Management Specialist

•  Provided technical expertise to EDS in all areas Identity  and Access Management.

•  Worked on both US and foreign country deployments with the main focus on deploying an globally highly available Identity  Management solution for
one of their clients.

•  Products supported were Oblix COREid (Oracle Access Manager), Oblix ShareID (Oracle
Identity Federation), Citrix, and other custom / home-grown applications.

ITT (FORT  WAYNE, IN / WHITE PLAINS, NY)  | FEBRUARY 2005 - MAY  2005
Access Management Specialist

•  Designed and implemented an Access control system around Oblix COREid

•  Implemented it directly into production  (customer demanded it) using ADAM as the user repository containing all 25,000 world-wide  employees.

•  Setup multiple reverse proxy Microsoft ISA servers to proxy Internet requests and relay them to the geographic closest Identity  and Access servers
for authentication  and authorization.

GUARDIAN LIFE INSURANCE CORPORATION (NEW YORK,  NY)  | AUGUST 2002 - FEBRUARY 2005
Data Security Specialist

•  Tivoli Access and Identity Manager deployment and administration

•  IBM Secure-Way LDAP administration and schema management

•  Computer Associates  SEOS and SSO administration and migration into IBM’s LDAP framework

•  Wrote custom VB and Perl applets for production  web-based LDAP management and development while TIM is being integrated.

•  Evaluation and implementation  of cross-platform SSO and user administration tools including
IBM’s IDI/TIM  and CA’s Admin

•  User administration and SSO control across seven platforms and over 100,000 users for home office, regional offices, and agencies

SYNERGY-DOT (ANN ARBOR,  MI)  | SEPTEMBER 2000 - AUGUST 2002
Network Administrator

•  Brought in and partitioned multiple T1 lines for BLEC services.

•  Ran wire, made drops, and responsible for all other hardware installs.

•  Configuration  and implementation of Cicso, Netgear, and Linksys routers, hubs, and switches.

•  Designed and developed a consulting department for current and prospective clients.
•  Implemented wireless bridging to provide Internet service to a broader area (802.11a/b) Performed maintenance and constant network analysis on
wireless access points  and bridges

UNIVERSITY COMPUTING (YPSILANTI, MI)  | AUGUST 1998 - SEPTEMBER 2000
Computer Systems and Network Administrator

•  First line support for developers using UNIX, HP, Macintosh and PC workstations

•  Helped maintain University network infrastructure.

Worked with legacy mainframe  systems and BANYAN VINES.


Education - Industr y
•  Oracle  Business Intelligence Enterprise Edition (OBIEE), Oracle  – San Francisco, CA, 2009
•  Oracle Entitlements Server (OES), Oracle  – San Francisco, CA, 2009
•  Oracle Role Manager (ORM), Oracle – New York, NY, 2008
•  Novell Identity  Manager, Novell – New York, NY, 2007
•  CA Identity Manager Suite (Identity Minder, Siteminder, Admin), CA – Islip, NY, 2007
•  Oracle  Identity  Manager Advanced Training (OIM), Oracle – Raleigh, NC, 2006
•  Oracle Access Manager Advanced Training (OAM), Oracle – New York, NY, 2006
•  Oracle Identity Manager Basic Training (OIM), Oracle – New York, NY, 2006
•  Sun Identity  Manager (SunIDM), Sun – New York, NY, 2005
•  IBM Tivoli Access and Identity Manager (TIM / TAM), IBM – Miami, FL, 2004
Back to Peningo Sample Resumes